SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Communications data retention in an evolving Internet Dr Ian Brown Oxford Internet Institute University of Oxford
Outline How are communications data retention and access powers being used? Are they proportionate? How are changing patterns of Internet usage and surveillance affecting data retention? How should data retention requirements be updated to meet law enforcement needs and protect privacy?
Comms data requests/m people Data: European Commission review of Data Retention Directive; IMF World Economic Outlook
Proportionality of retaining data “The decision to retain communication data for the purpose of combating serious crime is an unprecedented one with a historical dimension. It encroaches into the daily life of every citizen and may endanger the fundamental values and freedoms all European citizens enjoy and cherish.” –Article 29 WP Opinion 3/2006 “[70%] of all data are use within 0-3 months 
 and [85%] within 0-6 months” (EC review)
Recent court decisions Bulgarian Supreme Administrative Court blocked remote Ministry of Interior access to data and security service access without a court order (11 Dec 2008) “the obligation to retain the data 
 as an exception or a derogation from the principle of personal data protection 
 empties, through its nature, length and application domain, the content of this principle” –Romanian Constitutional Court, 8 Oct 2009 “Given the rapid advance of current technology it is of great importance to define the legitimate legal limits of modern surveillance techniques used by governments
 without sufficient legal safeguards the potential for abuse and unwarranted invasion of privacy is obvious” –Irish High Court, 5 May 2010
Changing usage patterns Google percentage of traffic Reach of Member Communities
Dragnet surveillance Hepting v. AT&T and Jewel v. NSA plaintiffs alleged Narus DPI equipment installed in San Francisco, Seattle, San Jose, Los Angeles and San Diego, and NSA given access to Daytona 300+ terabyte database of comms data UK Intercept Modernisation Programme and GCHQ “Mastering the Internet” contract
Efficacy of data mining ~5000 Americans surveilled over 4 years; led to <10 warrants per year “[T]here is not a consensus within the relevant scientific community nor on the committee regarding whether any behavioral surveillance 
 techniques are ready for use at all in the counterterrorist context" –US National Research Council (2008) p.4
Ways forward Update Data Retention Directive: Retain only subscriber data? Set 6 months as retention period? Impose BVFG conditions? Repeal entirely? Implement Cybercrime Convention: Art. 16(1) “Each Party shall adopt such legislative and other measures as may be necessary to enable its competent authorities to order or similarly obtain the expeditious preservation of specified computer data, including traffic data”

Weitere Àhnliche Inhalte

Was ist angesagt?

Right to be forgotten presentation
Right to be forgotten presentationRight to be forgotten presentation
Right to be forgotten presentation
reporter1120
 
Right to be forgotten final paper
Right to be forgotten final paperRight to be forgotten final paper
Right to be forgotten final paper
reporter1120
 
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
ioannis iglezakis
 
Francesca Fanucci, Ppt
Francesca Fanucci, PptFrancesca Fanucci, Ppt
Francesca Fanucci, Ppt
guestbc7697
 
Data Retention in the UK
Data Retention in the UKData Retention in the UK
Data Retention in the UK
blogzilla
 
Maeve Mc Donagh
Maeve Mc DonaghMaeve Mc Donagh
Maeve Mc Donagh
guestbc7697
 

Was ist angesagt? (20)

New Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionNew Media Internet Expression and European Data Protection
New Media Internet Expression and European Data Protection
 
Right to be forgotten presentation
Right to be forgotten presentationRight to be forgotten presentation
Right to be forgotten presentation
 
Right to be forgotten final paper
Right to be forgotten final paperRight to be forgotten final paper
Right to be forgotten final paper
 
Data Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing LandscapeData Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing Landscape
 
Victoria Cetinkaya - Research Integrity: Legal and policy obligations to shar...
Victoria Cetinkaya - Research Integrity: Legal and policy obligations to shar...Victoria Cetinkaya - Research Integrity: Legal and policy obligations to shar...
Victoria Cetinkaya - Research Integrity: Legal and policy obligations to shar...
 
Data Protection and Academia: Fundamental Rights in Conflict
Data Protection and Academia: Fundamental Rights in ConflictData Protection and Academia: Fundamental Rights in Conflict
Data Protection and Academia: Fundamental Rights in Conflict
 
I4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge ChungI4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge Chung
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information Flow
 
The power of FOI generated stories and campaigns: Krisztina Zala, Atlatszo, H...
The power of FOI generated stories and campaigns: Krisztina Zala, Atlatszo, H...The power of FOI generated stories and campaigns: Krisztina Zala, Atlatszo, H...
The power of FOI generated stories and campaigns: Krisztina Zala, Atlatszo, H...
 
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
Francesca Fanucci, Ppt
Francesca Fanucci, PptFrancesca Fanucci, Ppt
Francesca Fanucci, Ppt
 
Monitoring and controlling the Internet
Monitoring and controlling the InternetMonitoring and controlling the Internet
Monitoring and controlling the Internet
 
Data Retention in the UK
Data Retention in the UKData Retention in the UK
Data Retention in the UK
 
The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?
 
Maeve Mc Donagh
Maeve Mc DonaghMaeve Mc Donagh
Maeve Mc Donagh
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)
 
Privacy politics in the UK
Privacy politics in the UKPrivacy politics in the UK
Privacy politics in the UK
 
Cours CyberSécurité - Privacy
Cours CyberSécurité - PrivacyCours CyberSécurité - Privacy
Cours CyberSécurité - Privacy
 
Box 9
Box 9Box 9
Box 9
 

Ähnlich wie Communications data retention in an evolving Internet

Presentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissiePresentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese Commissie
Europadialoog
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
Konstantinos Demertzis
 
Environmental Protection Through E-Regulation: Critical and Empirical Perspec...
Environmental Protection Through E-Regulation: Critical and Empirical Perspec...Environmental Protection Through E-Regulation: Critical and Empirical Perspec...
Environmental Protection Through E-Regulation: Critical and Empirical Perspec...
RĂłnĂĄn Kennedy
 
Data Retention in the EU
Data Retention in the EUData Retention in the EU
Data Retention in the EU
blogzilla
 

Ähnlich wie Communications data retention in an evolving Internet (20)

Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Presentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissiePresentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese Commissie
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
1Âș Palestra sobre Proteção de Dados Pessoais
1Âș Palestra sobre Proteção de Dados Pessoais1Âș Palestra sobre Proteção de Dados Pessoais
1Âș Palestra sobre Proteção de Dados Pessoais
 
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the State
 
Proposal for a Regulation establishing the interoperability of EU informatio...
 Proposal for a Regulation establishing the interoperability of EU informatio... Proposal for a Regulation establishing the interoperability of EU informatio...
Proposal for a Regulation establishing the interoperability of EU informatio...
 
IT and Internet Law
IT and Internet LawIT and Internet Law
IT and Internet Law
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Environmental Protection Through E-Regulation: Critical and Empirical Perspec...
Environmental Protection Through E-Regulation: Critical and Empirical Perspec...Environmental Protection Through E-Regulation: Critical and Empirical Perspec...
Environmental Protection Through E-Regulation: Critical and Empirical Perspec...
 
Net neutrality, citizenship and discrimination
Net neutrality, citizenship and discriminationNet neutrality, citizenship and discrimination
Net neutrality, citizenship and discrimination
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
 
2627 8105-1-pb
2627 8105-1-pb2627 8105-1-pb
2627 8105-1-pb
 
Data Retention in the EU
Data Retention in the EUData Retention in the EU
Data Retention in the EU
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
 
The protection of the right to be forgotten: lessons and perspectives from Op...
The protection of the right to be forgotten: lessons and perspectives from Op...The protection of the right to be forgotten: lessons and perspectives from Op...
The protection of the right to be forgotten: lessons and perspectives from Op...
 

Mehr von blogzilla

Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
blogzilla
 
Regulating code
Regulating codeRegulating code
Regulating code
blogzilla
 

Mehr von blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
Regulating code
Regulating codeRegulating code
Regulating code
 

KĂŒrzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

KĂŒrzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Communications data retention in an evolving Internet

  • 1. Communications data retention in an evolving Internet Dr Ian Brown Oxford Internet Institute University of Oxford
  • 2. Outline How are communications data retention and access powers being used? Are they proportionate? How are changing patterns of Internet usage and surveillance affecting data retention? How should data retention requirements be updated to meet law enforcement needs and protect privacy?
  • 3. Comms data requests/m people Data: European Commission review of Data Retention Directive; IMF World Economic Outlook
  • 4. Proportionality of retaining data “The decision to retain communication data for the purpose of combating serious crime is an unprecedented one with a historical dimension. It encroaches into the daily life of every citizen and may endanger the fundamental values and freedoms all European citizens enjoy and cherish.” –Article 29 WP Opinion 3/2006 “[70%] of all data are use within 0-3 months 
 and [85%] within 0-6 months” (EC review)
  • 5. Recent court decisions Bulgarian Supreme Administrative Court blocked remote Ministry of Interior access to data and security service access without a court order (11 Dec 2008) “the obligation to retain the data 
 as an exception or a derogation from the principle of personal data protection 
 empties, through its nature, length and application domain, the content of this principle” –Romanian Constitutional Court, 8 Oct 2009 “Given the rapid advance of current technology it is of great importance to define the legitimate legal limits of modern surveillance techniques used by governments
 without sufficient legal safeguards the potential for abuse and unwarranted invasion of privacy is obvious” –Irish High Court, 5 May 2010
  • 6. Changing usage patterns Google percentage of traffic Reach of Member Communities
  • 7. Dragnet surveillance Hepting v. AT&T and Jewel v. NSA plaintiffs alleged Narus DPI equipment installed in San Francisco, Seattle, San Jose, Los Angeles and San Diego, and NSA given access to Daytona 300+ terabyte database of comms data UK Intercept Modernisation Programme and GCHQ “Mastering the Internet” contract
  • 8.
  • 9. Efficacy of data mining ~5000 Americans surveilled over 4 years; led to <10 warrants per year “[T]here is not a consensus within the relevant scientific community nor on the committee regarding whether any behavioral surveillance 
 techniques are ready for use at all in the counterterrorist context" –US National Research Council (2008) p.4
  • 10. Ways forward Update Data Retention Directive: Retain only subscriber data? Set 6 months as retention period? Impose BVFG conditions? Repeal entirely? Implement Cybercrime Convention: Art. 16(1) “Each Party shall adopt such legislative and other measures as may be necessary to enable its competent authorities to order or similarly obtain the expeditious preservation of specified computer data, including traffic data”

Hinweis der Redaktion

  1. Data: European Commission evaluation of data retention directive p.33; IMF World Economic Outlook 2009 population figures for 2008
  2. http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2006/wp119_en.pdf
  3. http://vortex.uvt.nl/TILTblog/?p=118#more-118http://www.aip-bg.org/documents/data_retention_campaign_11122008eng.htm
  4. http://onlinejournal.com/artman/publish/article_5296.shtmlhttp://www.eff.org/nsa/faq#11
  5. http://neoreading.files.wordpress.com/2010/01/traffic_map08_large.jpg